Event: Network Security 2.0: Global Data Security Best Practices

Visit the Link

September 28th, 2007

Event: Network Security 2.0: Global Data Security Best Practices
Date and Time: Wednesday, October 3, 2007 2:00 pm Eastern Daylight Time
Panelist(s) Info: Dr. Larry Ponemon, chairman and founder of Ponemon Institute and Jim Doherty, Chief Marketing Officer, CipherOptics
Duration: 1 hour
Description: According to the most recent research by the Ponemon Institute, chances are you are sending your sensitive data in clear text across multiple networks all over the globe. Does that make you a little nervous? It should.

Use the link above to register with CipherOptics for this event.

Join Dr. Larry Ponemon and Jim Doherty, as they discuss the findings, trends and observations from the most recent research by the Ponemon Institute on the issue of network security, including personal insights and recommendations from the following industry veterans:

  • Jerry Archer, CSO of Intuit
  • John Reece, chairman and CEO of John C. Reece & Associates and former deputy commissioner of Modernization and CIO of the IRS
  • Gregory P. Schaffer, CISO, Alltel Communications
  • Howard Schmidt, CEO of R&H Security Consulting and former U.S. Cyber Security Czar, former CSO of Microsoft and eBay
  • David VanderNaalt, Chief Information Officer of the State of Arizona, former CISO of American Express

Lippis Report Issue 90: WLAN Offerings Shift To Unified Wired & Wireless Networking

September 24th, 2007

There is a buying shift taking place in the WLAN market marked by a new basis of competition which values unification with wired networks. The shift places an advantage to those with LAN switch infrastructure market share. All the big network infrastructure players such as Cisco, ProCurve Networking by HP, Extreme Networks, Foundry Networks, Nortel et al., are focusing on unifying wired and wireless networking from a user experience, management and service level perspective. At the same time upstarts such as Aruba Networks, Trapeze Networks, Meru Networks, Ruckus Wireless and others offer WLAN approaches that either overlay on top of existing network infrastructure or they offer both wired and wireless devices. In this Lippis Report we analyze the unified wired and wireless
services from Cisco’s unified networking, ProCurve Networking by HP, Aruba’s Mobile Edge Architecture and Trapeze’s Smart Mobile architecture. We’ll address this topic in two parts. The first part presented here is a requirements statement based upon our consulting work with large enterprises. The second part, to be published in November is a supplier assessment against these requirements. Most IT decision makers want to cut to the chase and find out which suppliers we favor so we provide a sneak peak here.

Read the rest of this entry »

Network Security 2.0

Get the White Paper

September 24th, 2007

By CipherOptics

Network security is important in both the public and private sectors. Our nation’s critical infrastructure is dependent upon the secure and uninterrupted flow of sensitive information over the network. In short, the network is the conduit for conducting business in today’s global marketplace as well as ensuring our personal safety and security.

The purpose of this paper is to explain the importance of network security and data protection, the risks most organizations face today and how organizations can improve their ability to protect their critical information assets. The paper also discusses Ponemon Institute research findings about network and data security methods and technologies. These studies track the perceptions of IT security and data protection practitioners. Included in this paper are observations from a panel of five learned IT security experts.

Risk Management Techniques to Increase Network Availability

Get the White Paper

September 24th, 2007

By Nicholas John Lippis III
President, Lippis Report

The following paper provides risk management techniques to increase network availability and reduce network outages. The paper explores the tools and techniques available to business and IT leaders who seek to increase network availability through management, device feature exploitation and network design. The mixed network vendor approach to diversity and redundancy is explored and brought into question. The paper takes the position that a common network based upon mixed network supplier platforms paradoxically reduces network availability by increasing complexity, which increases Mean Time To Repair (MTTR) and operational cost. The paper further identifies that a mixed network vendor environment restricts design options, increases security vulnerabilities and limits the ability to optimize application performance. A single network platform supplier is recommended for mission critical operations as this approach reduces complexity, increases design options, and simplifies trouble isolation, hastening resolution while optimizing operational resources.

Lippis Report Issue 89: Session Initiation Protocol (SIP): An Industry Update

September 12th, 2007

For many business and IT leaders Session Initiation Protocol (SIP) means cheap, low cost IP phones. And while there are low cost SIP phones available, holding on to that concept only allows you to miss the main point, which is that SIP is an ecosystem and fundamental to a new era in communications. True, the IETF’s SIP goal was to create a protocol for setting up and tearing down real time sessions over IP packet networks. But SIP has transcended that goal by emerging as a framework which engineers leverage to architect IP communication solutions. There are three aspects to the SIP ecosystem: SIP connections, SIP end-points and the SIP platform. In this Lippis Report we explore the SIP ecosystem as the underpinning of unified communications.

Read the rest of this entry »

Unified Communications: Planning, Designing, and Making UC Harmonize with your IT Operations Model

Listen to the Podcast

September 12th, 2007

Ajay KapoorAjay Kapoor, Director Enterprise Communications in the Consulting and Systems Integration group for Avaya joins the Lippis Report podcast to discuss unified communications operations. Along with UC vendor selection are elements of integration and on-going solution management. Selecting a communications partner who has proven expertise and capabilities to take a holistic view of your business needs and work along side you to ensure optimal solution success will result in a competitive advantage. The key is to not just design a perfect symphony but to make sure that all of the pieces in the orchestra are playing seamlessly together and harmonizing to meet the required result.

Purchase a Transcript of this Podcast: $25

We have many podcasts transcribed, however some we do not. In the case that your purchased podcast transcription is not available, a four day delay will occur. Thank you for your support.








Session Border Controllers: Delivering Interactive Communications Across IP Network Borders

Get the White Paper

September 12th, 2007

By Acme Packet

This paper describes a strategy that leverages Session Border Controllers (SBCs) to deliver interactive communications over IP. This paper is written for service providers and provides insights into increased revenue generation through interactive communications over IP. It provides great examples and is well written.

The Aculab SIP Bridge for Third Party Call Control

Get the White Paper

September 12th, 2007

By Ian Colville, Product Manager Aculab

This paper describes a SIP-based approach to enhance media processing resource card or host media processing centric solutions with SIP signaling.

SIP Trunking Benefits and Best Practices

Get the White Paper

September 12th, 2007

By Janne Magnusson, VP Product Management Ingate® Systems

Back in the days of wireline telephony, when all phone calls went over the PSTN, businesses would purchase ?¢‚Ǩ?ìtrunks" ?¢‚Ǩ‚Äú a dedicated line or a bundle of circuits ?¢‚Ǩ‚Äú from their service provider. Today, we have adapted the concept of ?¢‚Ǩ?ìtrunking" to the IP-enabled landscape resulting in lower telephony costs and rapid return on investment (ROI) plus the opportunity for enhanced communications both within the enterprise and with vendors, customers and partners. SIP trunking offers lower cost and complexity to connect enterprise sites, partners, customers and suppliers to your SIP infrastructure.

Next Generation Mobile Video Surveillance

Get the White Paper

September 12th, 2007

By Vantrix Corporation

This white paper describes an architecture which leverages mobile devices to deliver video surveillance thanks to SIP user agent. The Vantrix Surveillance consists of two modules: a camera controller, in charge of the monitoring, event detection and streaming from cameras and other sensors; and a security server, which stores all recorded events and interfaces with the end device via the Internet or wireless networks. These end devices may be computers, SIP user agent devices or regular cell phones.

Integrating Telephony Services Into .NET Applications

Get the White Paper

September 12th, 2007

By Inova Solutions

Software developers have had limited access to telecom networks and capabilities. Specialized computer-telephony integration protocols are too complex and inflexible to properly link telephony services into enterprise business applications. As such, integrating person-to-person calling, conferencing, and call routing capabilities such as find me-follow me into applications has always been the preserve of specialized developers. As organizations continually attempt to increase the efficiency of their business processes through communications, the inability to easily tie communications services into the fabric of daily operational processes has emerged as a serious obstacle to business profitability.

With the advent of next-generation IP communications, Session Initiation Protocol (SIP), and Web services, these barriers to interconnectivity are being deconstructed. IT and communications systems now share a common language. However, developers are still faced with a lack of easy-to-use development tools to take advantage of this new interconnection capability. In particular, developers using Microsoft’s .NET Framework are challenged by the lack of tools to discover and incorporate telephony services into their business applications. SIP Objects.NET from Inova IT fills this void.

Forecast: Juniper Creates A Hurricane With New Enterprise LAN Products

Listen to the Podcast

September 5th, 2007

Zeus KerravalaZeus Kerravala, SVP of The Yankee Group’s Enterprise Research joins the Lippis Report podcast to discuss Juniper Networks and their enterprise initiative project; code named Hurricane. Juniper approaches the enterprise market tactically, entering market niches where they can add value. Not a bad approach, but a collection of niches does not sum up to be a serious enterprise provider. It seems that Juniper recognizes that it needs a complete enterprise product portfolio and seeks to jump in at the high end of the market by providing high density Gigabit and 10 Gigabit LAN products scalable to 100 Gigabit when standardized, based upon a new set of custom designed silicon, code named Hurricane. Zeus and I tell you want we know about Hurricane and provide a forecast as to its strength and the potential damage it will do to competitors. In short is Hurricane a category 5 storm or when it hits the market will it degrade to a tropical depression.

Purchase a Transcript of this Podcast: $25

We have many podcasts transcribed, however some we do not. In the case that your purchased podcast transcription is not available, a four day delay will occur. Thank you for your support.